Research on identification and classification methods of APP involving privacy infringement
易 黎1,邱秀连1,马 芳1,彭艳兵1,程 光2
Intrusion detection with Graph Neural Network-based process behavior embedding
胡启宬,何树果,朱 震
Industrial control intrusion detection method based on improved sparrow algorithm
杨忠君1,郑志权1,敖 然1,王国刚1,宗学军1,李鹏程2
Fault feature extraction method based on weighted discriminative stochastic neighbor embedding
夏丽莎1,刘 兵2
Research on accountability mechanism of China′s network information security from the perspective of national governance modernization
马晓飞,卢奕同,艾力彼热·艾力肯
Design and implementation of multi-eye airport video panoramic stitching algorithm based on LUT
张兴超,陈贤富
Real-time detection method of pill surface defects based on YOLOV5
钱 雪1,李 军1,唐 球2,钱晓雨1
Hybrid representation based framework for patent classification
王庆才1,2,刘贵全1,2
Intelligent pedestrian warning system based on ARM and deep learning
刘佳丽1,黄世震1,2,何恩德2
Architecture and application design of general command and display data engine
周 宇,尹志锋,李林峰,周 淦
Research on automatic monitoring and coarse positioning technology of ADS-B signal interference source
赵泽荣,胡 飞,伍 伟
Design and implementation of an auxiliary decision system for state analysis of measurement and control equipment
李林峰,周 宇,尹志锋,周 淦,杜 兵
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。